Securing Your Data In Transit For The Long Term

Size: px
Start display at page:

Download "Securing Your Data In Transit For The Long Term"

Transcription

1 Securing Your Data In Transit For The Long Term Or what happens when RSA encryption is finally broken by mathematicians or quantum computers? October 2014

2 ID Quantique Photon Counters Services Quantum Random Number Generators Technology Quantum Security Network Encryption Swiss company, founded 2001, based in Geneva Spin-off of University of Geneva, Group of Applied Physics Offers encryption technology which is safe into the quantum era Protection of long-term data in high-speed transit 2014 ID Quantique SA, Switzerland page 2 ID Quantique PROPRIETARY

3 Thank you! 2014 ID Quantique SA, Switzerland page 3 ID Quantique PROPRIETARY

4 HACKING IS EASY (AND EVERYONE IS DOING IT) 2014 ID Quantique SA, Switzerland page 4 ID Quantique PROPRIETARY

5 2014 ID Quantique SA, Switzerland page 5 ID Quantique PROPRIETARY

6 Optical Tapping for under 500 Optical fiber bending & coupling Buy an optical tap legally online Emitter Eavesdropper Receiver 2014 ID Quantique SA, Switzerland page 6 ID Quantique PROPRIETARY

7 Social Engineering A telecom company outsources the laying of new optical fibers for a bank to a maintenance team who do not understand the security issues. The naked optical fiber is accessible..and the detailed layout of the fiber network & the name of the bank is clearly visible for future hacking attempts 2014 ID Quantique SA, Switzerland page 7 ID Quantique PROPRIETARY 7

8 THE THREAT: PUBLIC-KEY CRYPTOGRAPHY 2014 ID Quantique SA, Switzerland page 8 ID Quantique PROPRIETARY

9 Public Key Cryptography: Threats Alice Bob What are the 2 prime factors of : Hint : ID Quantique SA, Switzerland page 9 ID Quantique PROPRIETARY 9

10 Public Key Cryptography: Threats Alice Bob = * ID Quantique SA, Switzerland page 10 ID Quantique PROPRIETARY 10

11 Public Key Cryptography: Threats Alice Bob Use mathematical «one-way» functions Theoretical Progress Vulnerable to x =? A x B = Increase in Computing Power Quantum Computers 2014 ID Quantique SA, Switzerland page 11 ID Quantique PROPRIETARY 11

12 Classical and Quantum Physics Classical physics Describes the macroscopic world Quantum physics Description of the microscopic world Deterministic Intuitive Probabilistic Central role of the observer Not very intuitive Quantum physics Novel information processing possibilities Quantum Information Theory (QIT) 2014 ID Quantique SA, Switzerland page 12 ID Quantique PROPRIETARY

13 The Threat: Quantum Computing Quantum Computing Basics Uses quantum properties, not binary code (qubits vs. bits) Acts as a massively parallel computer Will render today s public key encryption unsafe 2014 ID Quantique SA, Switzerland page 13 ID Quantique PROPRIETARY

14 Quantum Computing and Cryptography Shor s Algorithm Grover s Algorithm Peter Shor, 1994 Lov Grover, 1996 Quantum algorithm for integer factorization Quantum algorithm to perform search in an unsorted database O((log N) 3 ) vs O(e 1.9 (log N)1/3 (log log N)2/3 ) O(n ½ ) vs O(n) Key halfed for symmetric cryptography AES bits security AES bits security Can break RSA, Elliptic Curve & Diffie Hellman 2014 ID Quantique SA, Switzerland page 14 ID Quantique PROPRIETARY

15 Quantum Computing in Research America is building a quantum computer for cryptanalysis quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e e3-8def-a df2_story.html According to Snowden this is a major NSA initiative called Penetrating Hard Targets China Prepares for Quantum Age Source: The importance of building a quantum computer is such that the Chinese government funded 90 quantum related projects last year through the National Natural Science Foundation of China. Lazaridis (RIM cofounder) has invested $250 million+ into quantum computing at Waterloo Quantum Valley Dwave raised funds from Jeff Bezos (Amazon), InQTel (NSA investment arm) and sells to Lockheed Martin, NASA 2014 ID Quantique SA, Switzerland page 15 ID Quantique PROPRIETARY

16 When do we need to start worrying? «Wait and see» approach is too risky Time Vulnerability Information Exchange Information lifetime (based on legal, business or strategic constraints) Time for migration (from a few months to several years) Next generation of cryptographic infrastructure: Must have quantum-safe alternatives Should have algorithmic agility built in 2014 ID Quantique SA, Switzerland page 16 ID Quantique PROPRIETARY 16

17 Leading Signs That It s Time To Adopt QKD Quantum computers have more than 1000 qubits OR Quantum computers have demonstrated that Shor s algorithm to factor numbers works D-Wave sold a 128-bit computer in 2011; announced a 512-bit computer Lazaridis (RIM cofounder) has invested $250MM+ into quantum computing at Waterloo Quantum Valley RSA-1024 has been broken OR RSA-768 was cracked in December, 2009 using 5TB of data and 1500 CPU-years of a 2.2GHz Opteron NIST recommendation stop using RSA-1024 before 12/31/2013 U of Mich reported breaking RSA-1024 using a side channel attack Large organized networks of computers can be formed to solve complex, timeconsuming problems OR Network bots, SETI-at-home Bitcoin Millions-to-billions of smart phones around the world with quad-core ARM processors all linked over a common network (telecom systems) You transmit data over the network that needs to be protected for more than five years 2014 ID Quantique SA, Switzerland page 17 ID Quantique PROPRIETARY

18 The Solution: Quantum-Safe Cryptographic Infrastructure «Post-quantum» cryptography Classical codes deployable without quantum technologies Believed/hoped to be secure against quantum computer attacks of the future + Quantum Key Distribution Quantum codes requiring some quantum technologies currently available Typically no computational assumptions and thus known to be secure against quantum attacks Both sets of cryptographic tools can work together to form a quantum-safe cryptographic infrastructure 2014 ID Quantique SA, Switzerland page 18 ID Quantique PROPRIETARY

19 ONE SOLUTION: QUANTUM MECHANICS FOR SECURE ENCRYPTION KEYS 2014 ID Quantique SA, Switzerland page 19 ID Quantique PROPRIETARY

20 Change in Paradigm Network Encryption Key Management High speed cryptosystem implementation (typically AES) Crypto Key Lifecycle 2014 ID Quantique SA, Switzerland page 20 ID Quantique PROPRIETARY 20

21 THE SOLUTION (1): QUANTUM RANDOM NUMBER GENERATION (QRNG) 2014 ID Quantique SA, Switzerland page 21 ID Quantique PROPRIETARY

22 Quantum Randomness Physical Random Number Generator exploiting a phenomenon described by quantum physics Detectors Truly random Photons Semi-transparent Mirror Advantages Speed Source of photons Simple process that can be modeled influence of environment can be ruled out Live monitoring of elementary components possible 2014 ID Quantique SA, Switzerland page 22 ID Quantique PROPRIETARY

23 Quantum Random Number Generator 2014 ID Quantique SA, Switzerland page 23 ID Quantique PROPRIETARY 23

24 THE SOLUTION (2): QUANTUM KEY DISTRIBUTION (QKD) 2014 ID Quantique SA, Switzerland page 24 ID Quantique PROPRIETARY

25 Quantum Cryptography "0" "1" "1" "0" Fragile! Alice Message Scrambled Message Message Symmetric Cryptography Secret Key Secret Key Bob Identical keys Key Exchange?!? 2014 ID Quantique SA, Switzerland page 25 ID Quantique PROPRIETARY

26 Quantum-Enabled Network Encryption Transparent Layer 2 Encryption AES-256 in CFC and CTR modes Up to 100Gbps Multiprotocol (Ethernet, Fibre Channel) Provably secure key distribution: QKD Distilled key distribution rate: 1000 bps over 25km/6dB Range: 100km + xwdm Local Area Network Quantum Channel Dark Fiber Local Area Network 2014 ID Quantique SA, Switzerland page 26 ID Quantique PROPRIETARY

27 Today s Depoyments of QKD Hybrid solutions: Conventional encryption on wide area network QKD on DRC and backbone links (WAN) Classical Encryption Device Quantum Encryption Solution MAN/SAN 2014 ID Quantique SA, Switzerland page 27 ID Quantique PROPRIETARY

28 Sporting & Public Events Critical police & Joint Operations link secured during 2010 FIFA World Cup in South Africa Secured communication for data, telephone, internet, video, and ID Quantique SA, Switzerland page 28 ID Quantique PROPRIETARY

29 European Banks: Data Center Interconnect European banks secure critical links between bank headquarters and data recovery centers 2014 ID Quantique SA, Switzerland page 29 ID Quantique PROPRIETARY

30 Data Centers for Financial Companies QKD-secured data center link large financial institution in Netherlands Installed in 2010 High-speed encryption 4 x Ethernet 1G links 2 x FC-4 links 2014 ID Quantique SA, Switzerland page 30 ID Quantique PROPRIETARY

31 Government & Public Administration Downtown Geneva Geneva (Switzerland) uses QKD to guarantee confidentiality & integrity of data during federal & cantonal elections Geneva Government Data Center 4 km Central Vote Counting Station Ballots Working since October 2007 Mail Votes Cerberis Solution 2014 ID Quantique SA, Switzerland page 31 ID Quantique PROPRIETARY

32 Quantum Keys-as-a-Service by Telecom Operators Data Recovery Center World-first QKD-as-a-Service offered by Colt Data link between Swiss financial district and critical DRC 70 kms away Eg. 10Gigabit FCoIP link Bank Ethernet or FC connection for data Server Room Bank Colt provides quantumsecured link as a monthly service for banks & enterprises Client B QKD fiber Server Room Client B Easy to set up & maintain under existing SLAs First step towards a QuantumCloud Client C Server Room Client C Client D Server Room Client D 2014 ID Quantique SA, Switzerland page 32 ID Quantique PROPRIETARY

33 Enterprise: Corporate Data & IP Battelle USA World s largest nonprofit R&D organization Over 22,000 employees at more than 130 locations globally Requirement to protect mission critical corporate, financial information & intellectual property (designs, drawings, etc) IDQ s quantum cryptography used to secure critical links between headquarters in Columbus Ohio and satellite office in Dublin Ohio By 2015 will connect Battelle building in Washington DC with QKD-secured link Working with IDQ to develop trusted nodes for increased distance of QKD 2014 ID Quantique SA, Switzerland page 33 ID Quantique PROPRIETARY

34 QKD IN THE FUTURE 2014 ID Quantique SA, Switzerland page 34 ID Quantique PROPRIETARY

35 Battelle in 2015 Battelle QKD Backbone Columbus Ohio to Washington DC area > 770 km Deployment in 2015 Battelle Aberdeen Office Battelle Main Campus 2014 ID Quantique SA, Switzerland page 35 ID Quantique PROPRIETARY

36 2015: IDQ-Battelle quantum backbone for longterm inter-datacenter security Columbus, OH QKD pilot network (showing four Battelle-IDQ prototype Trusted Nodes operating today) illustrates multi-access metro topology ID Quantique SA, Switzerland page 36 ID Quantique PROPRIETARY

37 QKD Networks 2014 ID Quantique SA, Switzerland page 37 ID Quantique PROPRIETARY 37

38 Thank you for your attention 7th Winter School on Practical Quantum Communications Dates: January or February 2015 Location: Les Diablerets, Switzerland More: or Pictures from previous editions 2014 key note speakers included: Gilles Brassard Nicolas Gisin Vadim Makarov Sandu Popescu Renato Renner 2015 will include Whitfield Diffie Nicolas Gisin Catherine Mc Geoch Colin Williams and more! ID Quantique SA, Switzerland page ID Quantique PROPRIETARY

39 Our team today : Gilles Gravier Director Product Management [email protected] ID Quantique SA Pierre-Alain Hinnen Key Account Manager [email protected] 2014 ID Quantique SA, Switzerland page 39 ID Quantique PROPRIETARY

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 Quantum Safe Security Workgroup Presentation Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014 ID Quantique Photon Counters Services Quantum Random Number Generators Technology

More information

Quantum Enabled Security Solutions. Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com

Quantum Enabled Security Solutions. Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com Quantum Enabled Security Solutions Dr. Grégoire Ribordy ID Quantique SA www.idquantique.com 10 Years of Quantum Innovation IDQ presents its first quantum cryptography (QC) prototype First QC system sold

More information

1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4

1.Context... 3. What is the problem with current cryptographic techniques?... 3. 2.Current Quantum Key Distribution (QKD)... 4 Page 2 Table of contents 1.Context... 3 What is the problem with current cryptographic techniques?... 3 2.Current Quantum Key Distribution (QKD)... 4 What is Quantum Cryptography?... 4 How does QKD improve

More information

High speed link encryption State of the art. ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com

High speed link encryption State of the art. ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com High speed link encryption State of the art ID Quantique SA Kelly Richdale Léonard Widmer www.idquantique.com Agenda Company Solutions Risks Encryption Today (State of the Art) Quantum Cryptography, QKD

More information

24 th IEEE Annual Computer Communications Workshop (CCW)

24 th IEEE Annual Computer Communications Workshop (CCW) 24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California

More information

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell Quantum Key Distribution as a Next-Generation Cryptographic Protocol Andrew Campbell Abstract Promising advances in the field of quantum computing indicate a growing threat to cryptographic protocols based

More information

Quantum Computers vs. Computers Security. @veorq http://aumasson.jp

Quantum Computers vs. Computers Security. @veorq http://aumasson.jp Quantum Computers vs. Computers Security @veorq http://aumasson.jp Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert

More information

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University QUANTUM COMPUTERS AND CRYPTOGRAPHY Mark Zhandry Stanford University Classical Encryption pk m c = E(pk,m) sk m = D(sk,c) m??? Quantum Computing Attack pk m aka Post-quantum Crypto c = E(pk,m) sk m = D(sk,c)

More information

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem

More information

Cryptography and Network Security Chapter 9

Cryptography and Network Security Chapter 9 Cryptography and Network Security Chapter 9 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 9 Public Key Cryptography and RSA Every Egyptian received two names,

More information

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies 1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Fifth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared

More information

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information The : Keeping Eve The Eavesdropper Away From Your Credit Card Information Department of Mathematics North Dakota State University 16 September 2010 Science Cafe Introduction Disclaimer: is not an internet

More information

The New Approach of Quantum Cryptography in Network Security

The New Approach of Quantum Cryptography in Network Security The New Approach of Quantum Cryptography in Network Security Avanindra Kumar Lal 1, Anju Rani 2, Dr. Shalini Sharma 3 (Avanindra kumar) Abstract There are multiple encryption techniques at present time

More information

Quantum Safe Cryptography and Security

Quantum Safe Cryptography and Security ETSI White Paper No. 8 Quantum Safe Cryptography and Security An introduction, benefits, enablers and challenges June 2015 ISBN No. 979-10-92620-03-0 ETSI (European Telecommunications Standards Institute)

More information

Quantum computing in practice

Quantum computing in practice Quantum computing in practice & applications to cryptography Renaud Lifchitz OPPIDA NoSuchCon, November 19-21, 2014 Renaud Lifchitz NoSuchCon, November 19-21, 2014 1 / 68 Speaker s bio French senior security

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC

More information

DATA CENTER INTERCONNECT SICHERER UND FLEXIBLER DATENAUSTAUSCH ZWISCHEN RECHENZENTREN COPYRIGHT 2014 ALCATEL-LUCENT. ALL RIGHTS RESERVED.

DATA CENTER INTERCONNECT SICHERER UND FLEXIBLER DATENAUSTAUSCH ZWISCHEN RECHENZENTREN COPYRIGHT 2014 ALCATEL-LUCENT. ALL RIGHTS RESERVED. DATA CENTER INTERCONNECT SICHERER UND FLEXIBLER DATENAUSTAUSCH ZWISCHEN RECHENZENTREN AGENDA 1. Key Feature learning's from ancient Greece? 2. User challenges to be addressed for IT, Data Centre and Cloud

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago High-speed cryptography and DNSCurve D. J. Bernstein University of Illinois at Chicago Stealing Internet mail: easy! Given a mail message: Your mail software sends a DNS request, receives a server address,

More information

Quantum Safe Cryptography V1.0.0 (2014-10)

Quantum Safe Cryptography V1.0.0 (2014-10) White Paper Quantum Safe Cryptography and Security; An introduction, benefits, enablers and challenges ISBN 979-10-92620-03-0 Disclaimer This document reflects the views of the authors. It does not necessarily

More information

The Mathematics of the RSA Public-Key Cryptosystem

The Mathematics of the RSA Public-Key Cryptosystem The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through

More information

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP) Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic

More information

World Class Standards. QKD in ETSI. Gaby Lenhart Strategy and New Initiatives ETSI 2009. All rights reserved ECOC 2009

World Class Standards. QKD in ETSI. Gaby Lenhart Strategy and New Initiatives ETSI 2009. All rights reserved ECOC 2009 QKD in ETSI ECOC 2009 Gaby Lenhart Strategy and New Initiatives ETSI 2009. All rights reserved Current Use of QKD ECOC 2009 QKD already in use I 11. October 2007 Swiss Federal Elections ( http://www.idquantique.com/news/news-elections2008.htm)

More information

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/ Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP

More information

Cybersecurity in a Quantum World: will we be ready?

Cybersecurity in a Quantum World: will we be ready? Cybersecurity in a Quantum World: will we be ready? Michele Mosca University Research Chair 3 April 2015 Cyber technologies are becoming increasingly pervasive. Cybersecurity is a growing and fundamental

More information

Quantum Secure Communication Networks:

Quantum Secure Communication Networks: QCrypt 2014 Quantum Secure Communication Networks: Products and Solutions Yong Zhao 2014-09- 04 1 Founda2on Ini2ally founded by the university (USTC) and private investors in 2009 Research Lab (USTC) Company

More information

Blaze Vault Online Backup. Whitepaper Data Security

Blaze Vault Online Backup. Whitepaper Data Security Blaze Vault Online Backup Version 5.x Jun 2006 Table of Content 1 Introduction... 3 2 Blaze Vault Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 256-bit SSL communication... 4 2.2 Backup

More information

Elements of Applied Cryptography Public key encryption

Elements of Applied Cryptography Public key encryption Network Security Elements of Applied Cryptography Public key encryption Public key cryptosystem RSA and the factorization problem RSA in practice Other asymmetric ciphers Asymmetric Encryption Scheme Let

More information

Notes on Network Security Prof. Hemant K. Soni

Notes on Network Security Prof. Hemant K. Soni Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications

More information

In-Flight Encryption. Jim Theodoras. Feb 2014

In-Flight Encryption. Jim Theodoras. Feb 2014 In-Flight Encryption Jim Theodoras Feb 2014 OSI Model 7 6 5 Top of Stack Application Presentation Session Data 4 Transport Layer TCP, UDP Segments 3 Network Layer IP/MPLS Packets 2 Data Link MAC Frames

More information

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

More information

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense CONNECT PROTECT Communication, Networking and Security Solutions for Defense Engage Communication provides Defense, Homeland Security and Intelligence Communities with innovative and cost effective solutions

More information

DataTrust Backup Software. Whitepaper Data Security. Version 6.8

DataTrust Backup Software. Whitepaper Data Security. Version 6.8 Version 6.8 Table of Contents 1 Introduction... 3 2 DataTrust Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 128-bit SSL communication... 4 2.2 Backup data are securely encrypted...

More information

The science of encryption: prime numbers and mod n arithmetic

The science of encryption: prime numbers and mod n arithmetic The science of encryption: prime numbers and mod n arithmetic Go check your e-mail. You ll notice that the webpage address starts with https://. The s at the end stands for secure meaning that a process

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and

More information

Shor s algorithm and secret sharing

Shor s algorithm and secret sharing Shor s algorithm and secret sharing Libor Nentvich: QC 23 April 2007: Shor s algorithm and secret sharing 1/41 Goals: 1 To explain why the factoring is important. 2 To describe the oldest and most successful

More information

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption

Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption White Paper Meeting Today s Data Security Requirements with Cisco Next-Generation Encryption Today s Encryption Environments The number of cyber attacks targeting US organizational data has doubled over

More information

3. Designed for installation by the user without further substantial support by the supplier; and

3. Designed for installation by the user without further substantial support by the supplier; and Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 1 CATEGORY 5 TELECOMMUNICATIONS AND INFORMATION SECURITY Part 2 INFORMATION SECURITY Note 1: The control status of information

More information

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT

IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 IMPROVED SECURITY MEASURES FOR DATA IN KEY EXCHANGES IN CLOUD ENVIRONMENT Merlin Shirly T 1, Margret Johnson 2 1 PG

More information

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf

More information

Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4

Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4 Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4 Computer Science and Engineering, KL University Green Fields, Vaddeswaram, PO Dt-522 502, Andhra Pradesh,

More information

Encryption VIDEO COMMUNICATION SYSTEM-TECHNICAL DOCUMENTATION

Encryption VIDEO COMMUNICATION SYSTEM-TECHNICAL DOCUMENTATION Encryption PCS-1/1P Ver.3.20 or later PCS-11/11P Ver.3.20 or later PCS-HG90 Ver.2.00 or later PCS-G50/G50P Ver.2.21 or later PCS-G70/G70P Ver.2.21 or later PCS-TL30 Ver.1.04 or later PCS-TL33 All PCS-TL50

More information

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status 10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary

More information

Module 7 Security CS655! 7-1!

Module 7 Security CS655! 7-1! Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed

More information

Public Key (asymmetric) Cryptography

Public Key (asymmetric) Cryptography Public-Key Cryptography UNIVERSITA DEGLI STUDI DI PARMA Dipartimento di Ingegneria dell Informazione Public Key (asymmetric) Cryptography Luca Veltri (mail.to: [email protected]) Course of Network Security,

More information

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe. MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information

More information

Center for Internet Security. INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO

Center for Internet Security. INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Private and Public Key Cryptography and Ransomware December 2014 Authored by:ted Fischer (CIS) Security Operations

More information

A High Speed Quantum Communication Testbed

A High Speed Quantum Communication Testbed A High Speed Communication Testbed Carl J. Williams, Xiao Tang, Mikko Hiekkero, Julie Rouzaud, Richang Lu, Andreas Goedecke, Alan Migdall, Alan Mink, Anastase Nakassis, Leticia Pibida, Jesse Wen a, Edward

More information

Cryptography and Network Security Chapter 10

Cryptography and Network Security Chapter 10 Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central

More information

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure Email CS 393 Network Security Nasir Memon Polytechnic University Module 11 Secure Email Course Logistics HW 5 due Thursday Graded exams returned and discussed. Read Chapter 5 of text 4/2/02 Module 11 - Secure

More information

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF High Speed Ethernet Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF Hubs and Switches Hubs and Switches Shared Medium Hub The total capacity in the shared medium hub configuration (figure

More information

QUANTUM RANDOM NUMBER GENERATOR

QUANTUM RANDOM NUMBER GENERATOR QUANTUM RANDOM NUMBER GENERATOR ON A MOBILE PHONE Bruno Sanguinetti, Anthony Martin, Hugo Zbinden and Nicolas Gisin THE SECURITY OF A CYPHER MUST RESIDE ENTIRELY IN THE KEY AUGUSTE KERCKHOFFS [] [] A.

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING 2016 1

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING 2016 1 CSCI-E46: Applied Network Security Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING 2016 1 Welcome to CSCI-E46 Classroom & Schedule 53 Church Street L01 Wednesdays,

More information

Overview of Public-Key Cryptography

Overview of Public-Key Cryptography CS 361S Overview of Public-Key Cryptography Vitaly Shmatikov slide 1 Reading Assignment Kaufman 6.1-6 slide 2 Public-Key Cryptography public key public key? private key Alice Bob Given: Everybody knows

More information

C20.0001 Information Systems for Managers Fall 1999

C20.0001 Information Systems for Managers Fall 1999 New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in

More information

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

CRYPTOGRAPHY AND NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE SIXTH EDITION William Stallings International Edition contributions by Mohit P Tahiliani NITK Surathkal PEARSON Boston Columbus Indianapolis New

More information

Cryptography & Digital Signatures

Cryptography & Digital Signatures Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.

More information

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch 1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

More information

Virtual Privacy vs. Real Security

Virtual Privacy vs. Real Security Virtual Privacy vs. Real Security Certes Networks at a glance Leader in Multi-Layer Encryption Offices throughout North America, Asia and Europe Growing installed based with customers in 37 countries Developing

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

A Novel Approach for Signing Multiple Messages: Hash- Based Signature

A Novel Approach for Signing Multiple Messages: Hash- Based Signature International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. International Research Publications House http://www. irphouse.com A Novel Approach for Signing

More information

Marker Drivers and Requirements. Encryption and QKD. Enterprise Connectivity Applications

Marker Drivers and Requirements. Encryption and QKD. Enterprise Connectivity Applications Marker Drivers and Requirements for Encryption and QKD in Enterprise Connectivity Applications Christian Illmer September 2009 ADVA Optical Networking ADVA is a leading global provider of xwdm optical

More information

CRYPTOG NETWORK SECURITY

CRYPTOG NETWORK SECURITY CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 'jkfetmhki^^rij^jibwfcmf «MMr""'-^.;

More information

SSL DOES NOT MEAN SOL What if you don t have the server keys?

SSL DOES NOT MEAN SOL What if you don t have the server keys? SSL DOES NOT MEAN SOL What if you don t have the server keys? J. Scott Haugdahl Architect, Blue Cross Blue Shield MN Robert Bullen Systems Engineer, Blue Cross Blue Shield MN Setting Expectations This

More information

National Security Agency Perspective on Key Management

National Security Agency Perspective on Key Management National Security Agency Perspective on Key Management IEEE Key Management Summit 5 May 2010 Petrina Gillman Information Assurance (IA) Infrastructure Development & Operations Technical Director National

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

Software Tool for Implementing RSA Algorithm

Software Tool for Implementing RSA Algorithm Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key

More information

Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar

Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar Quantum Computing Lecture 7 Quantum Factoring Anuj Dawar Quantum Factoring A polynomial time quantum algorithm for factoring numbers was published by Peter Shor in 1994. polynomial time here means that

More information

Associate Prof. Dr. Victor Onomza Waziri

Associate Prof. Dr. Victor Onomza Waziri BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,

More information

7! Cryptographic Techniques! A Brief Introduction

7! Cryptographic Techniques! A Brief Introduction 7! Cryptographic Techniques! A Brief Introduction 7.1! Introduction to Cryptography! 7.2! Symmetric Encryption! 7.3! Asymmetric (Public-Key) Encryption! 7.4! Digital Signatures! 7.5! Public Key Infrastructures

More information

Elliptic Curve Cryptography

Elliptic Curve Cryptography Elliptic Curve Cryptography Elaine Brow, December 2010 Math 189A: Algebraic Geometry 1. Introduction to Public Key Cryptography To understand the motivation for elliptic curve cryptography, we must first

More information

An Introduction to Cryptography as Applied to the Smart Grid

An Introduction to Cryptography as Applied to the Smart Grid An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric

More information

Information Security and Cryptography

Information Security and Cryptography Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

White Paper. Enhancing Website Security with Algorithm Agility

White Paper. Enhancing Website Security with Algorithm Agility ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today

More information

Entanglement: The Holy Grail of High-Speed Design

Entanglement: The Holy Grail of High-Speed Design by Barry Olney column BEYOND DESIGN Entanglement: The Holy Grail of High-Speed Design While high-speed SERDES serial communications seems to currently be at the cutting edge of technology, maybe it will

More information

An Efficient data storage security algorithm using RSA Algorithm

An Efficient data storage security algorithm using RSA Algorithm An Efficient data storage security algorithm using RSA Algorithm Amandeep Kaur 1, Sarpreet Singh 2 1 Research fellow, Department of Computer Science and Engineering, Sri Guru Granth Sahib World University,

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography

More information